Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
|
|
|
- Peter Cole
- 10 years ago
- Views:
Transcription
1 Faulty Clock Detectio for Crypto Circuits Agaist Differetial Fault Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA Abstract. Clock glitch based Differetial Fault Aalysis (DFA) attack is a serious threat to cryptographic devices. Previous error detectio schemes for cryptographic devices target improvig the circuit reliability ad caot resist such DFA attacks. I this paper, we propose a ovel faulty clock detectio method which ca be easily implemeted either i FPGAs or itegrated circuits to detect the glitches i system clock. Results show that the proposed method ca detect glitches efficietly while eeds very few system resource. It is also highly recofigurable to tolerat clock iheret jitters, ad will ot ivolve complex desig work for differet processig techologies. Keywords: Clock glitch detectio, AES, differetial fault aalysis, side-chael attacks 1 itroductio Cryptosystems that provide ecryptio, decryptio, ad hashig fuctios have become the security egie of may critical systems ad ifrastructure. owever, their implemetatios, whether i software or hardware, are vulerable to side-chael attacks, which exploit parametric iformatio about cryptographic operatios icludig power cosumptio, timig iformatio, ad electromagetic emaatios to retrieve the secret key. Differetial Fault Aalysis (DFA) is a kid of side-chael attack, which itetioally ijects trasit faults ito a cryptosystem ad aalyzes the differece betwee the correct ad fault outputs to ifer the key. DFA was first iveted by Biham et. al. o the block cipher Data Ecryptio Stadard (DES) [1]. It was later applied to AES ad oly two pairs of correct ad faulty ciphertexts are required to break the cipher [2]. I [3], the fault model is relaxed to be a radom fault aywhere i oe of the four diagoals of the state matrix at the iput of the eighth roud of AES. It is show that eve if the fault iductio corrupts two or three diagoals, two to four faulty ciphertexts are eough to retrieve the correct key. The commoly used physical fault ijectio methods are clock glitchig, supply voltage variatio, ad laser radiatio. Clock glitchig is the most practical ad low-cost fault ijectio method, ad therefore clock glitch based DFA is more cotrollable ad becomes a real security threat. Work i [3] uses clock glitches to iject faults ito cryptographic devices. Work i [4] also demostrates the effectiveess of frequecy ijectio attacks o both a microcotroller ad a FPGA chip. Some high-level protectio methods for cryptographic systems employ error detectio ad correctio codes or redudacy [5,6] to improve the reliability of circuits, but caot resist clock glitch-based DFAs. Other protectio methods try to detect the fault ijectio sources ad therefore prevet DFAs [7]. I [7], a o-logic buffer-based delay chai is iserted, by moitorig the delay alog the delay chai, a possible clock glitch based DFA ca be detected. I [8], the authors desig a circuit with a master couter ad a slave couter clocked by the clock sigal, ad their results are compared to determie whether the differece is at least thus to detect the clock glitch. I this work, we propose a ew clock glitch detectio method which makes good use of the existig modules i ICs ad FPGAs. The proposed method ca be easily implemeted without cosiderig the complex process techology like i [7]. Meawhile, comparig with [8], our method is also highly recofigurable ad ca be easily cofigured accordig to differet requiremets of precisio ad system variatios. What s more, compare with previous methods, our scheme ca make good use of the existig resources i FPGAs ad ca also be implemeted efficietly i ASICs. Sythesis results show that our 1
2 proposed method has much lower resource overhead comparig with previous protectio schemes like i [5,6,9]. The rest of the paper is orgaized as follows. I Sectio 2, we revisit the basics of DFA attacks ad previous protectio methods. I Sectio 3, we describe the proposed detectio method ad discuss its advatages over the previous schemes. I Sectio 4, we show the sythesis ad simulatio results of the proposed method, ad compare it with previous protectio schemes. Fially we coclude the paper i Sectio 5. 2 Backgroud I this sectio, we briefly itroduce DFAs, ad review the existig work o ru-time error detectio of crypto circuits. 2.1 Differetial Fault Aalysis Attacks As fault aalysis is depedet o the algorithm of cryptosystem, we take AES [10] as example. AES-128 algorithm has te rouds of computatio, with the first ie rouds cosistig of four steps, SubByte, ShiftRow, MixColum, ad AddKey, ad the last roud just three steps - without MixColum. Previous work has demostrated that if faults ca be ijected betwee the MixColum operatio i roud eight ad SubByte operatio i roud te, DFA based o this fault model ca recover the last-roud key with just two pairs of correct ad faulty ciphertexts. Fig. 1 depicts the geeral DFA process. Before itroducig faults, the attacker first gets a pair of plaitext ad correct ciphertext (P, C), where P is a radomly chose plaitext ad C is the correspodig ciphertext with the last roud key as K 10. The attacker the ijects faults ito the cryptographic system ad obtai a faulty ciphertex, C, uder the same plaitext P. A fault caused by clock glitch that falls before the last roud computatio would result i a faulty iput P 10 to the last roud, istead of correct oe P 10. K 10 P 10 P 10 ' Fig. 1. Differetial fault aalysis model 2
3 By examiig the differece betwee C ad C, the attack ca idetify the locatio of the faulty byte i the 16-byte AES state, deoted as i. The attacker the makes a assumptio of the last roud key byte Ki 10. For ay key guess Ki 10, the attacker ca iversely compute the last roud iput P 10 ad P 10 from the ciphertext outputs. { P10 = AES10 1 (C, K10 i ) P 10 = AES10 1 (C, Ki 10 ). (1) Certai characteristics of the differece betwee P 10 ad P 10 ca be used to extract the correct Ki 10. For clock glitch fault ijectio, illegal clock will cause a setup-time violatio sice flip-flops are triggered before the output sigals are fixed to a correct value. I [3], the authors show that faults may happe i either sigle bytes or multiple bytes, or eve i multiple diagoals. They also demostrate that relatioship amog faulty bytes ca be used to recover the last roud key bytes. Other fault ijectio methods would icur more complex fault models ad there will be differet characteristics amog faulty bytes ad such characteristics ca be used for attacks [2,11]. 2.2 DFA Coutermeasures Previous works agaist DFAs use redudacy or error detectio codes to capture faults at ru-time [5,6,9]. This kid of protectio schemes ca detect ay ijected faults iside the circuits whe the results of the predictor based o the codes (or a redudat copy) ad the compressor of the origial copy do ot match. The methods are useful whe the faults fall o either the origial circuit or the protectio circuit, or the faults ijected i both parts result i differet errors. owever, faults ijected by clock glitches fall o the commo iput of these two parts ad would affect the two circuits simultaeously to geerate the same outputs. It is highly possible that the faults caused by clock glitches will escape these high-level error detectio methods. For the scheme proposed i [7], a o-logic buffer-based delay chai is iserted ito the origial desig with propagatio delay (T d ) predefied durig desig phase ad 1/T d idicates the upper boud of the clock frequecy of the crypto circuit. If the circuit rus too fast (i.e. the applied clock frequecy is faster tha/t d ), timig errors might occur. Thus by moitorig the result o this delay chai, a possible clock glitch based fault attack might be detected. For this desig, the problem is that it ivolves complex desig work for differet process techology ad crypto circuits, ad the system frequecy caot be chaged after productio. 3 Proposed Clock Glitch Detectio Method I this sectio, we propose a ew clock glitch detectio method to resist glitch based DFAs. The mai idea is that glitches make the clock irregular, ad we desig a circuit to moitor the clock pulses ad detect such irregularity at ru-time. Deote the system clock used i the cryptographic circuit as clock. To measure the width of clock pulses, we itroduce aother higher-frequecy clock source clk. The structure of the proposed scheme is show i Fig. 2. The Width Couters take clock as the iput sigal ad clk as the triggerig clock. The couters measure the width of the high pulse ad low pulse of clock i umber of clk cycles ad store the results i two Width Registers, oe for high ad the other for low. Cosiderig two cosecutive cycles of clock, deote the Width Couters result as 0 for the first logic 1, which meas the umber of cycles of clk while clock = 1, ad defie 0 the umber of cycles of clk for clock = 0 i the first cycle. Similarly, use 1 ad 1 to deote the width of the logic 1 ad logic 0 of the followig cycle, show as i Fig. 3. If the target clock ad the referece clk are both stable, the: { 0 = 1 0 =. (2) 1 3
4 ow Pulse Width Couter igh Pulse Width Couter Width Registers Crypto module Crypto output Fig. 2. The block diagram of the clock glitch detectio circuit Number of cycles: Fig. 3. Couter of the clock glitch detectio circuit For clock with 50% duty cycle, we have: 0 = 1 = 0 = 1. (3) If the clock is ot costat, the width of logic 0 or logic 1 of clock is varyig. Such differece betwee two cosecutive clocks ca be used to detect glitches i the system clock. If there is a glitch i clock show as i Fig. 4. The it s obvious that: { 0 1, , 1, (4) 2 thus the glitch is detected ad Alarm triggered. Number of cycles: 2 2 Fig. 4. Whe glitch happes i clock 4
5 3.1 Implemetatio of the Proposed Scheme Oe key poit of the desig is to have a stable high frequecy referece clock source clk. For FPGA ad other embedded systems, clock geerator ad phase-locked loop (P) ca be desiged iside the devices i the desig phase. A alterative method is to use existig resources. Take FPGA for example, a digital clock maager (DCM) or a P ca be used to geerate higher frequecy with clock as the iput clock. The Digital Clock Maager (DCM) primitive i Xilix FPGA is used to implemet delay locked loop, digital frequecy sythesizer, digital phase shifter, or a digital spread spectrum [12]. The P i FPGA is used to geerate multiple clocks with defied phase ad frequecy relatioships to a give iput clock [13,14]. For example, there are up to 12 DCM modules i Virtex 5 FPGAs ad each ca be used to geerate utmost 32 higher frequecy, ad cascaded DCMs ca be used to geerate eve higher frequecy output [15]. Assume oe DCM module is used to geerate 32 frequecy clk, the for stable clock, 0 = 1 = 0 = 1 = 16. For P ad DCM, if there is a glitch i clock, the glitch will be detected ad meawhile the frequecy geeratio module will lose OCK ad some operatios are eeded to reset the module [12,13,14]. The details will be explaied ad simulated i Sectio Advatage of the Proposed Scheme Compared to the previous faulty clock detectio schemes, our proposed scheme has several advatages. Firstly, it has a low resource requiremet. It ca be easily implemeted i FPGAs ad ICs, oly aother higher frequecy clock source or a clock maagemet module (P, etc) is eeded. Secodly, the proposed scheme is easily cofigurable accordig to the precisio requiremet of the system. The method i [7] requires to isert a o-logic buffer-based delay chai to the circuits ad the delay caot be chaged after productio. The delay ad the delay chai desig are also techology depedet ad therefore it icreases the desig difficulty ad complexity. Thirdly, it is easy to cotrol the frequecy of referece clock clk, ad higher precisio ca be achieved by usig higher frequecy clk. What s more, our scheme also has cofigurable threshold of clock jitter by cotrollig the comparator. Assume that the clock has slight variatios ad the width of clock is ot costat, we set the comparator to tolerat differet betwee 0 ad 1 (ad the differece betwee 0 ad 1 ) below λ, i.e., the variatio is ot caused by clock glitchig ad therefore is acceptable: { 0 1 < λ 0 1 < λ. (5) For istace, assume the frequecy of clk is 32 of clock, we ca set λ = 2 such that the variatio of clock ca be at most the width of 2 clk. igher precisio ca be achieved by usig higher frequecy clk ad λ ca be chose accordig to the sesitivity level requiremet ad clock jitter. 4 Implemetatio ad simulatio results To verify the fuctioality of the proposed scheme, we use Virtex-5 FPGA ad its iteral DCM [12,13] to implemet the proposed scheme. The target clock is ruig at 5 Mz ad its duty cycle is 75%. We use DCM to geerate the higher frequecy clock clk with the frequecy 160 Mz. The simulatio result is show as i Fig. 5, with a glitch added i clock. The results show that the proposed scheme ca detect glitches efficietly, with a alarm triggered whe the glitch is detected. Meawhile, the proposed scheme is very robust, which ca recover the moitorig higher frequecy clock rapidly after losig OCK of the target clock. Details of the simulatio result are show as i Fig. 6. For the above simulatio settigs, 0 = 1 = 24 ad 0 = 1 = 8 whe there is o glitch. The register pre high ct( 0 ) holds value 24 ad the value of pre low ct( 0 ) is 8 if the system clock is stable. Whe clock glitch happes, the register of the curret result of 1 is 17 which is smaller tha 24, ad thus the glitch is detected. 5
6 Fig. 5. Simulatio result of the proposed scheme Fig. 6. Detailed results of the couter registers To evaluate the implemetatio overheads of the proposed glitch detectio scheme, we implemet a glitch detectio scheme based o the origial AES usig P i Verilog ad sythesize it i Cadece Ecouter RT Compiler with the Nagate 45m Opecell library versio v The desigs were placed ad routed usig Cadece Ecouter. The latecy, the area overhead of the protectio schemes were estimated usig Cocurret Curret Source (CCS) model uder typical operatio coditio assumig a supply voltage of 1.1V ad a temperature of 25 Celsius degree. The sythesis results are show i Table 1. Table 1. Overhead Evaluatio of the Proposed Detectio Method Circuit Area (um 2 ) Power (mw ) OrigialAES P roposed The results show that the proposed glitch detectio scheme icurs 2.9% area overhead ad cosumes 12% more power tha the origial AES implemetatio. Comparig with the scheme proposed i [7] with oly about 0.47% area overhead, our proposed method cosumes a little more area. But for FPGAs, our scheme ca make good use of iteral DCM ad P modules. What s more, our method ca be very easy to implemet while the scheme i [7] ivolves complex desig work for differet FPGA families ad IC process techologies. 5 Coclusio I this paper, we propose a simple method to detect clock glitches ad the results show that the proposed scheme ca detect glitches i clock efficietly while eeds much fewer resource overhead tha the previous 6
7 protectio schemes. Compared with previous schemes, the proposed scheme is desiged specifically for clock glitch detectio ad it is highly recofigurable. The proposed scheme ivolves o complex work i desig phase for differet process techology. Refereces 1. E. Biham ad A. Shamir, Differetial fault aalysis of secret key cryptosystems, i Advaces i CryptologyCRYPTO 97. Spriger, 1997, pp G. Piret ad J.-J. Quisquater, A differetial fault attack techique agaist SPN structures, with applicatio to the AES ad KAZAD, i Cryptographic ardware ad Embedded Systems-CES Spriger, 2003, pp D. Saha, D. Mukhopadhyay, ad D. R. Chowdhury, A diagoal fault attack o the Advaced Ecryptio Stadard, IACR Cryptology eprit Archive, vol. 2009, p. 581, S. Skorobogatov, Sychroizatio method for SCA ad fault attacks, Joural of Cryptographic Egieerig, vol. 1, o. 1, pp , M. Karpovsky, K. J. Kulikowski, ad A. Taubi, Differetial fault aalysis attack resistat architectures for the advaced ecryptio stadard, i Smart Card Research ad Advaced Applicatios VI. Spriger, 2004, pp C.-. Ye ad B.-F. Wu, Simple error detectio methods for hardware implemetatio of advaced ecryptio stadard, Computers, IEEE Trasactios o, vol. 55, o. 6, pp , Igarashi, Y. Shi, M. Yaagisawa, ad N. Togawa, Cocurret faulty clock detectio for crypto circuits agaist clock glitch based DFA, i Circuits ad Systems (ISCAS), 2013 IEEE Iteratioal Symposium o. IEEE, 2013, pp M. Rohleder, T. Koch, V. itovtcheko, ad T. uedeke, Clock glitch detectio circuit, Dec , us Patet App. 13/131,349. [Olie]. Available: 9. M. Karpovsky, K. J. Kulikowski, ad A. Taubi, Robust protectio agaist fault-ijectio attacks o smart cards implemetig the advaced ecryptio stadard, i Depedable Systems ad Networks, 2004 Iteratioal Coferece o. IEEE, 2004, pp P. FIPS, 197, Advaced Ecryptio Stadard (AES), vol. 26, Y. i, K. Sakiyama, S. Gomisawa, T. Fukuaga, J. Takahashi, ad K. Ohta, Fault sesitivity aalysis, i Cryptographic ardware ad Embedded Systems, CES Spriger, 2010, pp DS485: Digital Clock Maager (DCM) Module. 13. DS622: Phase ocked oop (P) Module (v2.00a). 14. Altera Phase-ocked oop (Altera P) Megafuctio User Guide. 15. UG190: Virtex-5 FPGA User Guide. 7
Study on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
Incremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
Output Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
Implementation of Low Power Scalable Encryption Algorithm
Iteratioal Joural of Computer Applicatios (0975 8887) o of Low Power Scalable Ecryptio Algorithm K.J. Jegadish Kumar Assistat Professor SSN College of Egieerig Kalavakkam-603110 Cheai, Idia S. Salivahaa
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
Ekkehart Schlicht: Economic Surplus and Derived Demand
Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
Engineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
A Secure Implementation of Java Inner Classes
A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio
CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION
www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha
Evaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
Systems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised
I. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
MTO-MTS Production Systems in Supply Chains
NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost
Multiplexers and Demultiplexers
I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see
CHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean
1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.
A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:
DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
Reliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5
Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.
A probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
Soving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
Spam Detection. A Bayesian approach to filtering spam
Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System
Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur
QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy
QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their
Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.
Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
The Stable Marriage Problem
The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV [email protected] 1 Itroductio Imagie you are a matchmaker,
Department of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
Lecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
Chapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety
Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety
Capacity of Wireless Networks with Heterogeneous Traffic
Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Convention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
Ranking Irregularities When Evaluating Alternatives by Using Some ELECTRE Methods
Please use the followig referece regardig this paper: Wag, X., ad E. Triataphyllou, Rakig Irregularities Whe Evaluatig Alteratives by Usig Some ELECTRE Methods, Omega, Vol. 36, No. 1, pp. 45-63, February
Analyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
Institute of Actuaries of India Subject CT1 Financial Mathematics
Istitute of Actuaries of Idia Subject CT1 Fiacial Mathematics For 2014 Examiatios Subject CT1 Fiacial Mathematics Core Techical Aim The aim of the Fiacial Mathematics subject is to provide a groudig i
Chapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
Research Article Sign Data Derivative Recovery
Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov
Asymptotic Growth of Functions
CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll
CCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
Overview on S-Box Design Principles
Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea
CHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length
Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
Automatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
Domain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
HCL Dynamic Spiking Protocol
ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7
Determining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
CS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation
UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT 030038 1 The Role of Lati Square i Cipher Systems: A atrix Approach to odel cryptio odes of Operatio Jieju og Computer Sciece Departmet Uiversity of Califoria,
Convexity, Inequalities, and Norms
Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for
CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)
CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
Domain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
Designing Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied
CapNet: A Real-Time Wireless Management Network for Data Center Power Capping
CapNet: A Real-Time Wireless Maagemet Network for Data Ceter Power Cappig Abusayeed Saifullah,, Sriram Sakar, Jie Liu, Cheyag Lu, Raveer Chadra, ad Bodhi Priyatha Washigto Uiversity i St louis, Missouri
Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate
Iteratioal Coferece o Maagemet Sciece ad Maagemet Iovatio (MSMI 4) Istallmet Joit Life Isurace ctuarial Models with the Stochastic Iterest Rate Nia-Nia JI a,*, Yue LI, Dog-Hui WNG College of Sciece, Harbi
Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
>7011AUPS UNINTERRUPTIBLE P O W E R SUPPLIES
>7011AUPS UNINTERRUPTIBLE P O W E R SUPPLIES Power Failures Strike at the Heart of Critical Operatios 7011A Series Product Lie True O-Lie, Double Coversio UPS Mitsubishi Electric is the world s leadig
1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
EUROCONTROL PRISMIL. EUROCONTROL civil-military performance monitoring system
EUROCONTROL PRISMIL EUROCONTROL civil-military performace moitorig system Itroductio What is PRISMIL? PRISMIL is a olie civil-military performace moitorig system which facilitates the combied performace
Cantilever Beam Experiment
Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio
Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
Floating Codes for Joint Information Storage in Write Asymmetric Memories
Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 [email protected] Vaske Bohossia Electrical
Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY
Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,
How to read A Mutual Fund shareholder report
Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.
Managing and Implementing the Data Mining Process Using a Truly Stepwise Approach
Maagig ad Implemetig the Data Miig Process Usig a Truly Stepwise Approach Perttu Laurie (1, Lauri Tuovie (1, Eija Haapalaie (1, Heli Juo (1, Juha Röig (1 ad Dietmar Zettel (2. 1) Itelliget Systems Group,
Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond
What is a bod? Bod Valuatio I Bod is a I.O.U. Bod is a borrowig agreemet Bod issuers borrow moey from bod holders Bod is a fixed-icome security that typically pays periodic coupo paymets, ad a pricipal
Chapter 10 Computer Design Basics
Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview
C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..
(IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai
Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring
No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy
Properties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
Case Study. Normal and t Distributions. Density Plot. Normal Distributions
Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca
